Results 21 to 30 of about 4,527 (172)
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems [PDF]
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-
Günlü, Onur +3 more
core +2 more sources
Physical Unclonable Function [PDF]
A Physical Unclonable Function (PUF) is hardware that acts as a one-way function, whose each different instance provides unique outputs for the same distinct input. Although recent research has demonstrated the merits of PUFs as security primitives for resource-constrained computer systems, better implementations of them need to be identified ...
openaire +1 more source
Eingebettete Systeme bestimmen heutzutage weitgehend die Funktionalität von Automobilen, Industrieanlagen und mobilen Endgeräten. Mit der steigenden Vernetzung dieser Systeme gewinnt deren Sicherheit gegen Angriffe und böswillige Veränderungen zunehmend an Bedeutung.
Stefan Katzenbeisser, André Schaller
openaire +3 more sources
Dynamic Physically Unclonable Functions [PDF]
Physical variations in the manufacturing processes of electronic devices have been widely leveraged to design Physically Unclonable Functions (PUFs), which can be used for authentication and key storage. Existing PUFs are static, as their PUF responses remain the same regardless when the PUF is queried. Meanwhile, this paper presents the new concept of
Wenjie Xiong +3 more
openaire +1 more source
Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA
Physical unclonable functions (PUFs) are gaining traction as an attractive alternative to generating and storing device keying material over traditional secure non-volatile memory (NVM) technologies.
Jim Plusquellic
doaj +1 more source
Q-Class Authentication System for Double Arbiter PUF [PDF]
Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property of each entity or Integrated Circuit (IC) chip. It is expected that PUF be used in security applications such as ID generation and authentication.
Kazuo SAKIYAMA +3 more
core +2 more sources
Optimization of Memristive Crossbar Array for Physical Unclonable Function Applications
Memristive crossbar Physical Unclonable Function (PUF) structures are emerging as strong security primitives for resource-constrained devices demanding good retention time, negligible standby power, small size, and ultra-low power operating requirements.
Muhammad Ibrar Khan +3 more
doaj +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
A formal definition and a new security mechanism of physical unclonable functions
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim +5 more
core +1 more source
Biological physically unclonable function [PDF]
AbstractInformation security is one of the foundational requirements for any modern society thriving on digital connectivity. At present, information security is accomplished either through software algorithms or hardware protocols. Software algorithms use pseudo random numbers generated by one-way mathematical functions that are computationally robust
Akshay Wali +7 more
openaire +1 more source

